what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 1999-10-28

Posted Oct 28, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

Changes: Very important changes. File Version is now reported with greater success thanks to a patch provided by Jason Jordan. Performance is also improvemed in version 0.5 by removing a redundant function.
SHA-256 | 921547a24e65adf37ddcb9cc69c44533ff15fab2736157a39bc0478d4fb72ebb
Posted Oct 28, 1999
Authored by Stefan Ondrejicka

nscache is a simple program to browse the Netscape cache directory with a GTK UI. It shows the contents of the browser cache in a three level hierarchy of files: protocols, servers and documents. nscache permits you to files to the cache, remove files or gather various information about specific files.

Changes: You can now launch any viewer on a cache entry or associated URL and copy a URL to clipboard, configuration has been added via a ~/.nscacherc file, and the commandline is now handled with getopt().
tags | tool, protocol
systems | unix
SHA-256 | e32ecbc6abf2d0edb217627890d60702563cb16bc38ffc0bff933310c50e963e
Posted Oct 28, 1999
Authored by Tom Rothamel

Whois2 recursively queries whois servers. This makes it simple to determine the complete information about domain ownership in today's shared registry system.

tags | registry
systems | unix
SHA-256 | 2c32578183a8feb3b9fed9645278a7aa015b64ef9718cfb767c050a0e9e03ecd
Posted Oct 28, 1999
Authored by Zach Beane

multisort can merge multiple httpd logs from a single website distributed on multiple hosts (through round-robin DNS, for example) into a single date-ordered log. It's useful for preprocessing logs before feeding them to analyzers. It's written in C and is quite fast.

tags | system logging
systems | unix
SHA-256 | 50cc0e84738f1c9b4b587e4d13564c233be20c693fd2154f2e8a293f3d5bc17d
Posted Oct 28, 1999
Authored by Mike Schiffman

Libnet 1.0 has been released. Libnet is an API to help with the construction and handling of network packets. It provides a portable framework for low-level network packet writing and handling (use libnet in conjunction with libpcap and you can write some really cool stuff). Libnet includes packet creation at the IP layer and at the link layer as well as a host of supplementary and complementary functionality.

systems | unix
SHA-256 | d8577cc906b13b2566ab7f3b9f6fa11835294ab147acf5abc4d523408c1915da
Posted Oct 28, 1999
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: Segfaults in IP and SNA were fixed, as were asserts produced from building with a non-GNU make. Ethereal will now compile on AIX, and it should find libraries better with its newly-tweaked autoconf script. Also, an ICQ decoder was added, and NTP was modified a bit.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 1a46ee567aed3ca818fc3361bc48e2c17f9616fb71419a9cb74b1eb22893d728
Posted Oct 28, 1999
Authored by Underground Security Systems Research

Problem: The encryption algorithm used to save passwords to disk is weak and easily broken. Decryption program here.

tags | exploit
SHA-256 | 1b3afabfd5ff939a69eb0863f8806b0965927000c94e385fd52ea151fcac902f
Posted Oct 28, 1999
Authored by The MSG.Net Firewall Wrecking Crew

Axent Raptor 6.0 'IP Options DOS'. Tested on Intel/*BSD systems. Exercises the IP options bug reported in Raptor 6.0, this bug is fixed by an Axent official patch available here.

tags | exploit
systems | bsd
SHA-256 | e50c15da4d68cb8bc5970d2a2c0384d6e488c7b916efa9e7038b05fb41efe598
Posted Oct 28, 1999
Authored by Rusty Russell

etfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

tags | tool, arbitrary, firewall
systems | linux
SHA-256 | f4917334f36ca4cc4426e84f2dac7ec17b333061054625c2fd6204ec9b45dc06
Posted Oct 28, 1999
Authored by Underground Security Systems Research

The WFTPD v2.34,v2.40 Server and earlier a vulnerable to remotely exploitable buffer overflow. This can result in a denial of service and at worst in arbitrary code being executed on the system.

tags | exploit, denial of service, overflow, arbitrary
SHA-256 | 1da511ef5ea23df545a0b22c5a4538820e140e48715c156edb886c816c2c16b1
Posted Oct 28, 1999
Authored by Unyun | Site shadowpenguin.backsection.net

URL Live! 1.0 WebServer for Windows95/98/NT which is released by Pacific Software Publishing, Inc. (http://www.urllive.com/) also has a "../" security problem, any users can download any files on the victim host.

tags | exploit, web
SHA-256 | c64939edba329091851ebb821f527ea204471836402e1d30c11570c20750b105
Posted Oct 28, 1999
Authored by rain forest puppy

Zeus is a high-performance webserver available from Zeus Technologies (www.zeus.co.uk). There's a myriad of problems, that when combined together, could yield a remote root compromise.

tags | exploit, remote, root
SHA-256 | 65d6f38cd31d99a0d42671ac5798e0b7297ec2bffefafb358fe4c9721a74e92b
Page 1 of 1

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By